There’s been a great deal of excitement, interest and certainly follow-on questions after we announced our new hybrid cloud integration solution, Nexus 1000V InterCloud. My earlier three-part blog consisted of Part 1 on the architecture and features, Part 2 on the hybrid cloud management specifics, and Part 3 a recap of the frequently asked questions.
And now, we have the video demonstration. At Cisco live! last month in London, TechWise TV‘s Robb Boyd caught up with Prashant Gandhi, Sr. Director of Product Management in our Server Access and Virtualization Business Unit, before the trade show floor opened and recorded a demonstration of the new hybrid cloud infrastructure.
In this demo, Prashant quickly migrates a few virtual machines from our simulated private cloud to Amazon Web Services hosting servers. Part of the ease of use is through integration of Cisco’s Virtual Network Management Center (VNMC) InterCloud to Amazon cloud management tools, and the ability to view and manage virtual machines in both the private data center as well as those hosted in the cloud. The other important point about Nexus 1000V InterCloud is not only how it provides all the seamless layer 2 connectivity and security to connect the data center to public cloud resources quickly and easily, but security and application policies can be mirrored and migrated just as easily in the public cloud through the use and deployment of Cisco Cloud Network Services, such as our Virtual Security Gateway, the ASA 1000V Cloud Firewall or vWAAS. Take it away Robb and Prashant…
At Cisco Live! in London this week, Cisco is demonstrating some enhancements to its Nexus 1000V virtual switch that greatly ease some of the challenges in deploying VXLAN in large scale cloud networks. VXLAN was designed to solve the problem of setting up traditional virtual networks (VLANs) in large multi-tenant cloud environments: the limited ID range for VLAN tags was quickly exhausted and a larger ID pool was needed for larger shared infrastructures. VXLAN thus becomes the foundation for a virtual network tunnel or virtual network overlays on top of physical networks. And unlike VLANs, VXLANs are designed to act as L2 virtual networks over L3 physical networks. For a more in-depth refresher on VXLAN, start here.
[Note: Join Cisco for a Live Announcement Webinar on Cloud Innovations on February 5: Register Here]
While VXLANs have certainly enabled a whole new level of scalability for virtual networks, one of the challenges in deploying VXLAN is its use of IP Multicast to implement the L2 over L3 network capability. Why is this? VXLAN is a MAC-in-IP encapsulation protocol in a UDP frame. The virtual switch that acts as the VXLAN termination (in Cisco’s case, the Nexus 1000V virtual switch) takes the L2 packet from the VM, wraps it in a L3 IP header, and sends it out over UDP. But the challenge is that there’s no way to determine which IP address should be used for the destination host (VXLAN termination point) at which the desired MAC address can be found. In other protocols, this can be accomplished within the network control plane and some MAC to IP mapping protocol, but the VXLAN specification indicates there should be no reliance on a control plane or a physical to virtual mapping table.
This blog is live from the floor of Cisco Live in London. The highlight for me this year in London has been the introduction, with our partners Ping Identity, of the Identity Cloud Connector, built on onePK, as part of the Cisco Cloud Connectors family of solutions. I’ll go into that in more detail below, but first some other highlights.
Yesterday we delivered a full day workshop on network automation, including EEM and introductions to onePK. Bruno Klauser, Joe Clarke, Jason Pfeifer, with me in a supporting role, helped 29 attendees through a series of exercises to help them get the most out of the extensive automation features on our platforms. The attendees must have liked it, as the score was 4.61/5. Well done guys!
The buzz here in the World of Solutions (WoS) is great. We have onePK demonstrations in the Data Centre and Borderless Network architecture zones, and we have been talking to customers and partners non-stop, all day. The Open Network Environment (ONE) strategy has really gripped people’s imagination, and it has been very exciting, and fun, to engage in some serious conversations about what ONE can do for our customers’ businesses. Read More »
I am sitting and reflecting here at the start of Cisco Live London. As I walk the halls, I continue to be amazed by the size, depth, and breadth of this event. Networking continues to grow, and thousands of people are eager to come together to see the latest. Read More »
Cisco Live Europe returns to London this year more precisely at the ICC Excel Conference Centre.
By focusing on “What You Make Possible”, attendees are invited to hear customer testimonials and see Cisco’s innovation solutions that showcase what is possible when partnering with Cisco.
As usual the event is divided between a series of educational programs, starting on Monday January 28 with a full day of technical seminars , followed on the 29, 30, 31 and even Feb 1st by a large range of opportunities
Keynotes sessions with CTO Padmasree Warrior (1/29) and Data Center SVP/GM David Yen (1/30 )
Break out sessions
Meet the Engineers
I will not detail all the activities. I encourage you to check the website. If you’re in London you want to attend directly – If not you may want to check www.ciscolive356.com to discover a large choice of sessions that you can attend on line .